ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Detection Systems Research

  • Future of the SOC Forces shaping modern security operations

    Sponsored by: Chronicle

    The age of AI, IoT, cloud computing and other disruptive technologies has driven fundamental change in security operations approaches and objectives. This white paper explores 3 fundamental forces that are shaping the need to change threat management and SOCs – read on to learn more.

  • Measuring the ROI of Security Orchestration and Response Platforms

    Sponsored by: Splunk

    Security orchestration and response (SOAR) platforms have become the force multiplier needed to unlock the full power of an organization’s security investment by helping security teams focus on innovation rather than mundane tasks. Read this white paper to measure the ROI of SOAR.

  • The Promise of XDR for Effective Threat Detection and Response

    Sponsored by: Fortinet, Inc.

    In a recent ESG survey, a couple of telling conclusions came to light: Detection and response efforts are stressed to a breaking point, and organizations want consolidated and integrated security operations solutions. Extended detection and response (XDR) may be able to help. Access the full ESG report to learn the specific benefits of XDR.

  • 7 Experts on Transitioning to MDR

    Sponsored by: GoSecure

    Managed detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.

  • Case Study: Archdiocese

    Sponsored by: Bitdefender

    The Archdiocese isn’t typically renowned for their IT and cybersecurity skills. However, in this case study, they partnered with Bitdefender to integrate MDR capabilities as part of a project to consolidate time spent on security operations and enable their IT staff to focus on strategic initiatives. Read on to unlock the full story.

  • The Impact of XDR in the Modern SOC

    Sponsored by: Dell SecureWorks

    Extended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.

  • Detecting and Defending Against SSRF

    Sponsored by: WhiteHat Security

    Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.

  • The 2020 State Of Security Operations

    Sponsored by: Palo Alto Networks

    A successful data breach can have devastating impacts – from loss of data to loss of customer trust and potential litigation. This Forrester report aims to identify and understand the challenges facing security operations (SecOps) teams as they work to manage the growing threat of sophisticated data breaches.

  • XDR: Extended Detection and Response

    Sponsored by: Palo Alto Networks

    Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.

  • The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation

    Sponsored by: Palo Alto Networks

    Endpoint detection and response (EDR) is quickly becoming a ubiquitous security technology in the age of remote work. As such, it is critical for security professionals to be aware of the vendors in the space. Tap into the Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation to help you pick the right tool for your organization.

  • Building a Strong and Effective Incident Response Plan

    Sponsored by: ServiceNow

    Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.

  • The Benefits of Automating Security with SOAR Tools

    Sponsored by: ServiceNow

    Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.

  • How to Improve Your Security Incident Response Process

    Sponsored by: ServiceNow

    Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.

  • Incident Response Tools: How, When & Why to Use Them

    Sponsored by: Claranet

    Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.

  • How to Prevent Cloud Cryptojacking Attacks on your Enterprise

    Sponsored by: Cisco Umbrella

    Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.

  • Five Critical Steps to Achieving an Effective Application Security Program

    Sponsored by: IBM

    Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.

  • Intrusion Detection and Prevention: Decision Time

    Sponsored by: SearchSecurity.com

    Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.

  • Intrusion Detection and Prevention: RFP Technology Decisions

    Sponsored by: SearchSecurity.com

    To properly evaluate IDS/IPS products, you must understand vendor offerings and how well they fit with your organization.

  • Intrusion Detection and Protection: From Business Problem to Technical Solution

    Sponsored by: SearchSecurity.com

    Learn how IDS/IPS help you thwart attacks and mitigate post-attack damage.

  • Vendor Landscape: Intrusion Detection and Prevention Systems

    Sponsored by: IBM

    This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.

  • Advanced Persistent Threats: Detection, Protection and Prevention

    Sponsored by: Sophos

    Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.

  • Five critical steps to achieving an effective application security program

    Sponsored by: IBM

    This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.

  • HP TippingPoint Provides Next-Generation Network Security

    Sponsored by: Hewlett Packard Enterprise

    This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.

  • Enterprise Security and your Technology

    Sponsored by: Hewlett Packard Enterprise

    This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.